Security
The Ping SDKs are built from the ground up to use best practices for securing token material and data.
Security is a very broad subject, and every environment is different. Readers are expected to do their own research and complement the information found in these topics.
Tokens and keys
Learn how the Ping SDKs secure your session and OAuth 2.0-related tokens, and the encryption used.
Authentication
Discover the protocols the Ping SDKs use when your app authenticates your users.
Data
What data do the Ping SDKs use, and what security measures help to protect it.
OAuth 2.0
See how the Ping SDKs use Proof Key for Code Exchange (PKCE) to mitigate the risks of an OAuth 2.0 attack.